Wired's new Guide to Digital Security is an excellent addition to the genre of simple-to-follow how-tos for reducing the likelihood that you'll be victimized by computer-assisted crime and harassment, and that if you are, the harms will be mitigated.
Like Motherboard's guide, it is formatted as a series of short articles; like EFF's Surveillance Self Defense kit, it is structured around different kinds of threats, with separate paths for "civilians," "public figures" and "spies."
Some of the standout articles:
* Smartphone Security 101: The Steps That Matter Most in which Lily Hay Newman offers "quick and easy steps to make big improvements to your mobile security";
* How to Encrypt All of the Things, where Andy Greenberg shows you "how to keep snoopers out of every facet of your digital life, whether it's video chat or your PC's hard drive";
* How to Sweep For Bugs and Hidden Cameras, where Lily Hay Newman basically shows that unless you're really technologically sophisticated, this is very, very hard;
* and What to Do if You’re Being Doxed, where Newman interviews the Electronic Frontier Foundation's Eva Galperin for really practical advice on what could easily be a nightmare scenario.
Electronic security is a team sport: that's why the Cybersecurity Campaign Playbook has a chapter for how family members of political campaigners should armor themselves against being used as a means to get at their relatives.
This is the ideal season for you to help you up your family's security game. When you go home for the holidays, think about how you can install software, change defaults, and teach your family good practices to help you -- and them -- stay safe.
If this interests you, read EFF's Security Education Companion, which teaches you how to be an effective communicator of security precepts.
The WIRED Guide to Digital Security
MG has built a proof-of-concept malicious USB cable with a tiny wifi radio hidden inside of it, able to wirelessly exfilatrate stolen; he calls it the O. MG, and while the prototype cost him $4k and took 300 hours, he's working with a team on a small production run for other security researchers to play […]
Writing on Techcrunch, Zack Whittaker (previously) calls out the timeworn phrase "we take your privacy and security seriously," pointing out that this phrase appears routinely in company responses to horrific data-breaches, and it generally accompanied by conduct that directly contradicts it, such as stonewalling and minimizing responsibility for breaches and denying their seriousness. "We take […]
The Internet of Dongs is Brad Haines's term for the world of internet-connected, "teledildonic" sex toys, and Haines, along with Sarah Jamie Lewis, have exhaustively documented all the ways in which internet-connected sex toys can screw you, from leaking private data to physically attacking your junk.
What do Facebook, Twitter, YouTube and Google all have in common? Somewhere in their framework, they all use MySQL, that most versatile (and free!) of database management systems. And they’re not alone. If your company or the one you’d like to work for wrangles data (and who doesn’t?), they’re going to need someone with a […]
There’s a reason you’re hearing about the gig economy in every other business story these days. More than ever, people are finding income from more than one source. And if you find the right one, a side hustle can do more than just pad your pockets – it can allow you to finally get paid […]
High-def cameras are available to anyone and for much less than they were just a decade ago. Even the phones in our pockets can be used to shoot and edit short films. It’s never been easier to be a filmmaker, providing you have the technique. Enter the Film & Cinematography Mastery Bundle, an online boot […]